Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 02:27

General

  • Target

    5dfa1737e103c8643e061c17c4f3726c3d055688003fcfcb57fdb040d5feb6d4.dll

  • Size

    9KB

  • MD5

    5f45c4a763cde6555515ffee14a45f02

  • SHA1

    cdf277c41eaa7e3a78d799a8852075d4538d0e86

  • SHA256

    5dfa1737e103c8643e061c17c4f3726c3d055688003fcfcb57fdb040d5feb6d4

  • SHA512

    5370f1f72a01b1051b4451d510e65e768d7e8f777be8aaa8cebc82db4d20ad6034a90225744e1b247cef39877358ecddd848b5ecd77713d4eaed5ed33fabeb93

  • SSDEEP

    96:q1V7dR7uwEU+hCT3GrxZ4MUtPNlz0MdG8EWvdM3IWwG34b:kuwEt8rsTUtPLzKNWSYWF4b

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5dfa1737e103c8643e061c17c4f3726c3d055688003fcfcb57fdb040d5feb6d4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5dfa1737e103c8643e061c17c4f3726c3d055688003fcfcb57fdb040d5feb6d4.dll,#1
      2⤵
        PID:1260

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1260-55-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

      Filesize

      8KB

    • memory/1260-56-0x0000000000161000-0x0000000000163000-memory.dmp

      Filesize

      8KB